You are on page 1of 9

JUNE 2011 COMMON TEST School of Business & Accountancy (Diploma in Accountancy) (Diploma in Banking & Financial Services)

(Diploma in Business Information Technology) (Diploma in Business Studies) (Diploma in Tourism & Resort Management)

Level 1

Time Allowed: 1.5 Hours

INFORMATION TECHNOLOGY IN BUSINESS (007956/007965/008004/008017/008148) INSTRUCTIONS TO CANDIDATES: 1. Check carefully to ensure you are sitting for the correct paper. 2. Answer ALL questions in Sections A, B and C. 3. Write all your answers on this question paper. 4. This paper consists of 9 pages including this cover page. Check carefully to make sure your set is complete.

Name Student No Tutorial Group

SECTION A : Multiple Choice Questions (40 marks) Choose the most appropriate answer for each question and write the letter presenting it in the bracket on the right. Each question is worth 1 mark. 1. Digital photo is stored using ______________numbers. a. decimal b. binary c. hexadecimal d. kilobytes ( ) 2. Which of the following is NOT an input device? a. Mouse b. Scanner c. Microphone d. Plotter ( ) 3. Which of the following is NOT a typical function of an operating system such as Windows 7? a. Manage the memory function b. Control multiple processors and hardware c. Manage the function of application software such as word-processing d. Provides services to application programs and users ( ) 4. In a Database Management System (DBMS) such as Microsoft Access, which of the following is normally used to read, insert, modify, update and delete data? a. Tables b. Forms c. Queries d. Reports ( ) 5. Which of the following devices is considered the brains of the computer? a. Central Processing Unit b. Random access memory c. Read-only memory d. Motherboard ( ) 6. Which of the following is NOT one of the Porters competitive strategies? a. Being a cost leader b. Employing a cost strategy within a niche c. Focusing on differentiating product form that of competitors d. Globalizing ( )

7. Application software ______________________ a. is another name for operating system b. helps maintain the resources of the computer c. includes products like MS Office, Adobe CS5, tax and accounting software d. both A and C ( ) 8. RAM is classified as __________ storage in a computer system. a. volatile b. permanent c. nonvolatile d. static ( ) 9. A system that is ____________ can be incrementally expanded as the business needs occurs. a. interoperable b. redundant c. scalable d. transparent ( ) 10. When searching the Internet, which of the following is true? a. It doesnt matter which search engine you use; they all provide the same results b. All data and articles found in search engines are free c. Boolean operators and advanced search pages will not help to narrow your results d. Google is the most popular search engine ( ) 11. Individuals typically depend on ___________ software to support their personal needs. a. off-the-shelf b. custom- designed c. expensive d. client-server ( ) 12. Which of the following can be done by a spyware program? a. Block access to hackers b. Corrupt your computer files c. Crash your hard drive d. Fry your motherboard ( )

13. What is the first thing you should do when considering a computer hardware purchase? a. Choose a famous manufacturer b. Consider a popular platform c. Decide between a desktop, notebook, tablet or handheld d. Examine your usage and needs ( ) 14. Web sites created to express one or more individuals vies on a given topic are called __________________ . a. blogs b. buddy lists c. portals d. search engines ( ) 15. In a relational database, which of the following uniquely identify a record? a. A field b. A foreign key c. A primary key d. A file ( ) 16. Which of the following IT companies is voted the worlds most valuable brand as in May 2011? a. Google b. Apple c. Microsoft d. IBM ( ) 17. Which of the following technology is referring to computing networks provided as a service on Internet? a. Cloud Computing b. Grid Computing c. Client-server computing d. Mainframe computing ( ) 18. When a computer is first powered on, the processor is fed with instructions from __________________ . a. RAM b. ROM c. register storage d. secondary storage ( )

19. _______________ is data organized and presented in a manner that has additional value beyond the value of the data itself. a. A database b. Information c. Input d. Software ( ) 20. In a business organization, computer personnel typically work in a computer department that may employ all the following except a _______________ . a. Chief information officer (CIO) b. Chief executive officer (CEO) c. computer operator d. system analyst ( )

SECTION B : True or False Questions (10 marks) Indicate if the statement is true or false. Circle T for true and F for false. Each question is worth 1 mark. 1 Common application for Microsoft Excel is to use as a database for customer details. T/F 2 Multitasking involves running more than one application program at the same time. T/F 3 Patches are corrections to software code to fix software bugs. T/F 4 ROM is temporary, or volatile, memory that store bytes of data and program instructions for the processor to access. T/F 5 Firewall can be used to eliminate and remove computer virus. T/F 6 Procedure is one of the 5 components of an information system. T/F 7 Firmware is computer software installed into devices such as printers and cell phones. T/F 8 A database that can be used to store and manipulate a single table is called a single-user database. T/F 9 Substitution Threat is one of the Porters 5 competitive forces affecting a business organization. T/F 10You can get computer viruses from cookies, so you should not allow them and/or should delete them often. T/F

SECTION C : Short Answer Questions (50 marks) Answer the following questions. You may express your answers in point form. Question 1 A. What is competitive strategy? Briefly describe four different strategies, as defined by Porter. (10 marks)

B. Give an example of four different companies that have implemented each of the strategies as in part (A)? (4 marks)

Question 2 A. Briefly explain the main differences between Trojan horses and worms. (8 marks)

B. Briefly discuss THREE common applications of using spreadsheet program such as Microsoft Excel. (6 marks)

Question 3 A. What is the difference between horizontal-market application software and vertical-market software? List one example for each type of software. (10 marks) B. List any 4 major operating systems. What is the most popular operating system for business users and why? (12 marks) *** END OF PAPER ***

You might also like